Class of cybersecurity attacks
Cache timing attacks also known as Cache attacks are a type of side-channel attack that allows attackers to gain information about a system purely by tracking cache access made by the victim system in a shared environment.[ 1] [ 2] [ 3] [ 4] [ 5]
^ Kiriansky, Vladimir; Lebedev, Ilia; Amarasinghe, Saman; Devadas, Srinivas; Emer, Joel (2018). "DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors" . 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) . pp. 974–987. doi :10.1109/MICRO.2018.00083 . hdl :1721.1/124388 . ISBN 978-1-5386-6240-3 . S2CID 44165047 . Retrieved 2023-11-17 .
^ Van Goethem, Tom; Joosen, Wouter; Nikiforakis, Nick (2015-10-12). "The Clock is Still Ticking: Timing Attacks in the Modern Web" . Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security . New York, NY, USA: Association for Computing Machinery. pp. 1382–1393. doi :10.1145/2810103.2813632 . ISBN 978-1-4503-3832-5 . S2CID 17705638 .
^ Liang, Bin; You, Wei; Liu, Liangkun; Shi, Wenchang; Heiderich, Mario (2014). "Scriptless Timing Attacks on Web Browser Privacy" . 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks . pp. 112–123. doi :10.1109/DSN.2014.93 . ISBN 978-1-4799-2233-8 . S2CID 2583517 . Retrieved 2023-11-17 .
^ Bonneau, Joseph; Mironov, Ilya (2006). "Cache-Collision Timing Attacks Against AES". In Goubin, Louis; Matsui, Mitsuru (eds.). Cryptographic Hardware and Embedded Systems - CHES 2006 . Lecture Notes in Computer Science. Vol. 4249. Berlin, Heidelberg: Springer. pp. 201–215. doi :10.1007/11894063_16 . ISBN 978-3-540-46561-4 .
^ Kurth, Michael; Gras, Ben; Andriesse, Dennis; Giuffrida, Cristiano; Bos, Herbert; Razavi, Kaveh (2020). "NetCAT: Practical Cache Attacks from the Network" . 2020 IEEE Symposium on Security and Privacy (SP) . pp. 20–38. doi :10.1109/SP40000.2020.00082 . ISBN 978-1-7281-3497-0 . S2CID 202751810 . Retrieved 2023-11-17 .